+34 900 840 407
support@cytomic.ai

What is the Vulnerability Assessment in Advanced EPDR/EDR?

Related Products_
  • Advanced EPDR
  • Advanced EDR
Introduction_

The vulnerability assessment module built on Aether platform finds computers on the network with known software vulnerabilities and reports on the availability of patches to mitigate vulnerability impact on computers.

Vulnerability assessment supports Windows, macOS, and Linux operating systems. It identifies third-party applications that have missing patches or have reached end of life (EOL), as well as the patches and updates released by Microsoft for all of its products (operating systems, databases, Office applications, etc.).

Vulnerability assessment does not install the identified patches on managed computers. You can install the required patches on your own or purchase the Cytomic Patch module to install the patches centrally from the Cytomic console.

Vulnerability Assessment Settings_

To enable the solution to automatically search for available patches, enable Automatically search for patches. If this option is not enabled, the solution lists do not show missing patches, although you can use patch installation tasks to install missing patches on computers.

Network administrators can choose between installing patches manually or using a third-party tool. However, by purchasing the Patch module, you can install patches centrally and automatically from the Advanced EPDR console.

Search frequency
Search for patches with the following frequency specifies how often vulnerability assessment searches the cloud-based patch databases to check for missing patches for your computers.

Patch criticality
Specifies the importance (or criticality) of the security patches that vulnerability assessment searches for.

IMPORTANT! Windows Service Packs are not applied to macOS or Linux computers or devices

Software vendors define the importance of the security patches they make available to address vulnerabilities. Patch classifications are not universal and vary by vendor. To determine whether you want to install a patch, we recommend that you review its description, especially for patches that a vendor does not classify as Critical.

Patches containing bug fixes and feature enhancements for macOS and Linux are included in the Other patches (non-security related) category.

Vulnerability Assessment Requirements_

Supported Windows operating system versions

Workstations
Windows 7 (32 and 64-bit)
Windows 8 (32 and 64-bit)
Windows 8.1 (32 and 64-bit)
Windows 10 (32 and 64-bit)
Windows 11 (64-bit)

Servers
Windows 2008 (32 and 64-bit) and 2008 R2
Windows Small Business Server 2011, 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server Core 2008, 2008 R2, 2012 R2, and 2016
Windows Server 2022

Supported macOS operating system versions

macOS Catalina 10.15
macOS Big Sur 11
macOS Monterey 12
macOS Ventura

Supported Linux operating system versions

Supported 64-bit distributions:

Red Hat: 7.0, 8.0
CentOS: 7.0
SUSE Linux Enterprise: 12, 15

Required URLs

https://cpg-nap.pandasecurity.com/nap/buffer
https://cpp-nap.pandasecurity.com/nap/buffer

Vulnerability Assessment Status_

Shows computers where vulnerability assessment is working correctly and computers where there have been errors or problems installing or running the module. The status of the module is represented with a circle with different colors and associated counters. The panel shows the number and percentage of computers with the same status.

To access the dashboard, select Status from the top menu. Select Vulnerability assessment from the side menu. You can see either of these values for each computer or device:

  • Enabled
  • Disabled
  • Install error
  • No license
  • No information
  • Error

You can create and save Vulnerability Assessement lists from My lists, Add.